Learn More
This paper proposes an authentication scheme for JPEG images based on digital signature and semi-fragile watermarking. It can detect and locate malicious manipulations made to the image, and verify the owenership of the image at the same time. The algorithm uses the invariance of the order relationship between two DCT coefficients before and after JPEG(More)
  • 1